WGU D075 OA

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which communication technology has a range of approximately 30 feet and allows smartphones, tablets, and handheld product scanner devices to communicate with a network? *GPS *Bluetooth *Cellular *Wi-Fi

Bluetooth

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer? *Ensuring that the IT infrastructure is up to date *Interfacing with the IT users and setting end-user policies *Managing the IT group and designing the IT architecture *Keeping the IT development projects on schedule

Managing the IT group and designing the IT architecture

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees? *Project management system *Customer relationship management system *Knowledge management system *Human resource management system

Knowledge management system

What is the major function of a computer operating system? *Data management *Application program management *Network management *Computer resource management

Computer resource management

Which file format is suitable to use when sharing a legal contract that requires a digital signature? *DOCX *HTML *PDF *XML

PDF

Which strategy can be used to help a company's web page appear on the first page of search results in a browser? *Web analytics *Search engine optimization *Content marketing *Search engine advertising

Search engine optimization

Where does IoT data collection begin? *The database *The internet *The cloud *The edge

The edge

A company produces a mobile app that provides recipes and cooking tutorials. Which category of app is this? *Utility *Lifestyle *Social networking *Entertainment

Lifestyle

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week? *An intranet at Endothon that the manufacturer can access *An extranet that provides Endothon access to data from the manufacturer *An intranet at the manufacturer that Endothon can access *An extranet that provides the manufacturer access to data at Endothon

An extranet that provides the manufacturer access to data at Endothon

What is the key characteristic that differentiates a datamart from a data warehouse? *A datamart uses centralized data storage while a data warehouse is decentralized. *A datamart is a cloud-based service while a data warehouse requires a dedicated server. *A datamart is smaller and more specialized in its focus than a data warehouse. *A datamart allows a broader set of data structures than a data warehouse.

A datamart is smaller and more specialized in its focus than a data warehouse.

What is an example of an Internet of Things (IoT) device? *A tire-pressure indicator displayed on a car dashboard *A light bulb that can be turned on or off with a smartphone *A motion sensor that turns a light on when movement is detected *A wireless computer keyboard connected to a laptop

A light bulb that can be turned on or off with a smartphone

The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system? *Sales *Accounting *Operations *Marketing

Accounting

Which technology enables people without computer programming skills to design and publish their own websites? *Browser-based web development tools *Simplified web scripting languages *Web application framework innovations *Cloud-based web hosting platforms

Browser-based web development tools

Which category of software includes programs such as word processors and PDF document readers? *Application software *Project software *System software *Utility software

Application software

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? *File transfer *Object embedding *Object linking *Copy and paste

Copy and paste

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which legal protection prohibits unethical duplication of this computer program? *Trademark *Registration *Copyright *Brand

Copyright

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior? *Patent *Copyright *Trade secret *Trademark

Copyright

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort? *Master data management *Schema design *Data governance *Database management

Data governance

A marketing employee is tasked with mailing discount coupons to the company's top 100 customers by sales volume. The marketing employee only has lists of customers' names, customers' addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers? *Data structuring *Data warehousing *Data mining *Data intelligence

Data mining

What are scrubbed data? *Data that are organized into database tables *Data that have been validated for accuracy *Data that have been eliminated because they are inconsistent *Data that have been deleted for privacy reasons

Data that have been validated for accuracy

A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments. Which term refers specifically to this type of device? *Peripheral computer *Microcomputer *Minicomputer *Handheld computer

Handheld computer

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? *User Datagram Protocol (UDP) *Transmission Control Protocol (TCP) *Internet Protocol version 6 (IPv6) *Hypertext transfer protocol (HTTP)

Internet Protocol version 6 (IPv6)

Which type of technology can be used to monitor every product in a warehouse to enable real-time inventory tracking and updates? *Wide area network (WAN) *Mobile utility application *Operations management system *Radio-frequency identification (RFID)

Radio-frequency identification (RFID)

Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work? *Offline communication *Peer-to-peer communication *Real-time communication *Face-to-face communication

Real-time communication

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? *Fair Labor Standards Act *Santini-Burton Act *Sarbanes-Oxley Act *Freedom of Information Act

Sarbanes-Oxley Act

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software? *Network development *Network architect *Network administrator *Network engineer

Network administrator

Which type of device is an ethernet card? *Network interface controller (NIC) *Network firewall hardware *Network operating system (NOS) *Network server hardware

Network interface controller (NIC)

Computer system administrators protect the organization when they require strong passwords to connect to the server, enact policies for safe internet browsing, and install malware-protection software to keep unwanted users and viruses out. Which term is used to describe this set of practices? *Software protection *End-user security *Network security *Malware protection

Network security

What is it called when an organization implements security procedures to protect the hardware, network, and software from intrusion? *System-level security *Access-level security *Data-level security *User-level security

System-level security

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? *The door lock *The camera *The exterior light *The interior light

The door lock

How does the healthcare industry use Internet of Things (IoT) devices? *To track ambulance locations and movements *To access electronic medical records *To research public health history *To monitor patients' heart rate and oxygen levels

To monitor patients' heart rate and oxygen levels

Which term is used to refer to data that come from many different sources in various structures? *Unstructured data *Disparate data *Semistructured data *Source data

Disparate data

A small online retailer has grown rapidly over the past year, and now during times of high activity, the retailer's web server is nearly at capacity. The retailer anticipates continued rapid growth but is concerned that this growth may stall if the economy goes into recession. What is an appropriate strategic planning decision for this retailer to make in order to ensure adequate server capacity? *Install clustered web servers *Install a load balancer on the server *Use a cloud web hosting service *Use browser-based web development

Use a cloud web hosting service

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing? *Social media surveys provide customer feedback. *Social media users often submit product reviews. *User behavior can be tracked in social media. *User behavior is highly predictable in social media.

User behavior can be tracked in social media.

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? *An encryption key *A MAC address *A digital signature *A password

A password

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? *A mesh topology *A linear bus topology *A star topology *A ring topology

A star topology

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing? *By providing companies with transparent pricing on all advertising offerings *By providing companies with the opportunity to easily solicit customer feedback and interaction *By allowing companies to track which sales can be connected directly to a specific advertisement *By allowing companies to utilize user-generated content as an advertising tool

By allowing companies to track which sales can be connected directly to a specific advertisement

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? *Chief operating officer *Chief cybersecurity officer *Chief information security officer *Chief technology officer

Chief information security officer

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images? *Declaring the images to be copyrighted *Registering the images with a copyright office *Publishing the marketing images *Creating the marketing images

Creating the marketing images

What are the basic components, in addition to computers, that are required for a local network to function? *Ethernet cards, a common protocol, ethernet cables, and a hub *Ethernet cards, a modem, a router, and a network database *Internet connection, a network interface controller, and a cabling system *Internet connection, a network operating system, and a network administrator

Ethernet cards, a common protocol, ethernet cables, and a hub

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files? *Knowledge management system *Project management system *Cloud database system *File-sharing system

File-sharing system

A large automobile maker has added sensors to its assembly line equipment to alert managers to manufacturing anomalies via a mobile application (app) on their smartphones. This Internet of Things (IoT) system connects proprietary manufacturing components. What is the greatest risk created by incorporating this IoT system? *Reduced worker productivity *Increased production cost *Reduced management effectiveness *Increased security risk

Increased security risk

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer? *It allows for universal data transmission to various types of wireless networks. *It provides a wired ethernet connection to the network. *It serves as an internal transmission bus between components within the computer. *It allows the computer to connect peripheral devices.

It allows the computer to connect peripheral devices.

What is the defining characteristic of a part of a system that is considered a point of failure? *It is a part of the system that has failed. *It causes everything to stop if it fails. *It causes a security risk if it fails. *It is prone to frequent failure.

It causes everything to stop if it fails.

What is a key capability of a decision support system? *It generates detailed reports of business decisions. *It analyzes data and makes business decisions. *It compiles data from many systems to assist in decision-making. *It distributes strategic reports to stakeholders for decision-making.

It compiles data from many systems to assist in decision-making.

How does a Gantt chart facilitate project management? *It maps the flow of communication and decisions for a project *It identifies and sequences the tasks of a project. *It helps calculate the projected and actual costs of a project. *It graphically shows the organization of a project team.

It identifies and sequences the tasks of a project.

What is the final step in the deployment and use of an app? *Market the app using focused marketing to reach the desired audience *Launch the app in the app stores for all applicable platforms *Track the technical performance and user reviews of the app *Maintain and upgrade the app based on use and user feedback

Maintain and upgrade the app based on use and user feedback

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called? *Cost benefit analysis *Return on investment *Profit and loss *Profitability ratio

Return on investment

Which level of management gets the most detailed reports directly from the transaction processing system? *Supervisors *Managers *Laborers *Executive

Supervisors

When using extract, transform, and load (ETL), what is done during the "transform" step? *The data are normalized and structured. *The data are given context and relevance. *The database is queried for relevant data. *The database schema is designed and created.

The data are normalized and structured.

What is the velocity of big data? *The processing speed of the database servers *The rate at which the data in a data set become decayed *The speed of data produced in a given time *The frequency with which the data set must be updated

The speed of data produced in a given time

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? *The human resource (HR) management system *The business intelligence (BI) system *The cloud web hosting (CWH) system *The transaction processing system (TPS)

The transaction processing system (TPS)

What is the purpose of a MAC address? *To uniquely identify an internet URL *To uniquely identify a computer motherboard *To uniquely identify an email client *To uniquely identify a computer on a network

To uniquely identify a computer on a network

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive. What are these very small files called? *Tracking URLs *Tracking data *Tracking cookies *Tracking packages

Tracking cookies


संबंधित स्टडी सेट्स

Exam 2 Material Elbow/Wrist/Hand

View Set

Project Management (1 of 6):Overview

View Set

Accounting Chapter 11, ACCT 5312 (Ch. 8-11) Exam 3

View Set

CoursePoint Final Exam Practice Test

View Set

Week 2 quiz questions - Diabetes

View Set